Network Fundamentals Flashcards

1
Q

What are networks?

A

Networks connect devices to facilitate seamless data flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two main types of networks?

A
  • Wired: Ethernet, fiber optic.
  • Wireless: Wi-Fi, cellular.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give examples of network types with real-world use cases.

A
  • PAN (Personal Area Network): Smartwatch connecting to a smartphone via Bluetooth.
  • LAN (Local Area Network): Home Wi-Fi connecting tablets, desktops, routers, and modems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is network convergence?

A

The unification of voice, data, and video communication over a single network connection.
Example: Smartphones process all communication as digital data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is high availability important in networks?

A

It ensures continuous service with minimal downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the “Five-Nines” of availability?

A

99.999% uptime, allowing for only ~5 minutes of downtime per year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name some key network devices.

A

Clients, servers, hubs, switches, wireless access points, routers, firewalls, load balancers, proxies, IDS, and IPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the main networking models?

A
  • Client-server model
  • Peer-to-peer model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define the following network geographies:

A
  • PAN: Small, personal devices.
  • LAN: Home or small office.
  • CAN: University or corporate campuses.
  • MAN: City-level coverage.
  • WAN: Large geographic areas, including the internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List common wired network topologies.

A

Point-to-point, Ring, Bus, Star, Hub-and-spoke, Mesh.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List common wireless network topologies.

A

Ad hoc, Point-to-point, Infrastructure mode, Wireless mesh networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are common data center topologies?

A

Three-tiered model, Collapsed core model, Spine-and-leaf model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is traffic classification important in data centers?

A

It helps understand how data enters, leaves, or transmits within the data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary purpose of network components?

A

To enable efficient, secure, and reliable data transmission between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are clients in a network?

A

Devices used by users to access the network, such as laptops, tablets, smartphones, smart TVs, and IoT devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are servers and their types?

A

Devices that provide resources to the network (e.g., email, file, web servers).

  • Hardware-based: Physical machines.
  • Software-based: Virtual servers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a hub, and why is it inefficient?

A

A legacy device that connects devices over LAN but broadcasts data to all devices, causing inefficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does a switch improve upon a hub?

A

Switches forward data only to the intended recipient, enhancing security and bandwidth efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Wireless Access Point (WAP)?

A

A device that allows wireless devices to connect to wired networks via radio frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the role of a router in a network?

A

Connects multiple networks and directs traffic using IP addresses, relying on routing protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does a firewall do?

A

Monitors and controls traffic between internal and external networks to block unauthorized access and cyber threats.

Types: Hardware-based, software-based, or hybrid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a load balancer’s function?

A

Distributes traffic across multiple servers to improve efficiency, capacity, and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a proxy, and what does it provide?

A

An intermediary between devices and the internet that offers web filtering, data caching, security, and privacy by masking IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Differentiate between IDS and IPS.

A
  • IDS (Intrusion Detection System): Detects unauthorized access or anomalies and alerts administrators.
  • IPS (Intrusion Prevention System): Detects and actively blocks threats, such as dropping harmful packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the role of controllers in Software-Defined Networking (SDN)?

A

They centrally manage switches and routers for greater flexibility and efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define Network-Attached Storage (NAS).

A

A centralized file storage system accessible to authorized network clients, allowing easy data sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Storage Area Network (SAN)?

A

A high-speed network for consolidated block-level data storage, supporting large-scale server data storage like disk arrays or tape libraries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is network media?

A

The physical materials used to transmit data, such as copper cables, fiber optics, and wireless signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are WAN links, and what technologies do they use?

A

Connections for networks across large geographic areas using leased lines, satellites, and cellular networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Why is understanding network components important?

A
  1. Design: Enables efficient, secure network creation.
  2. Management: Aids in maintaining optimal performance.
  3. Problem-Solving: Improves troubleshooting skills.
  4. Security: Facilitates effective security measures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the Client-Server Model?

A

A network setup where dedicated servers provide resources (e.g., files, printers) to clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the benefits of the Client-Server Model?

A
  1. Centralized Administration: Easy resource and permission management.
  2. Scalability: Expandable with more servers or cloud integration; supports load balancing.
  3. Reliability: Resources are available 24/7 via dedicated servers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the drawbacks of the Client-Server Model?

A
  1. Cost: Requires dedicated hardware and specialized software (e.g., Windows Server).
  2. Skill Requirement: Needs trained personnel for setup and maintenance.
  3. Dependency: Server failure results in loss of resource access for all clients.
34
Q

What is the Peer-to-Peer (P2P) Model?

A

A decentralized network where devices (peers) share resources directly without a dedicated server.

35
Q

What are the benefits of the Peer-to-Peer (P2P) Model?

A
  1. Low Cost: No need for dedicated hardware or specialized software.
  2. Flexibility: Any peer can share resources as needed.
  3. Ease of Setup: Quick and simple to establish with minimal infrastructure.
36
Q

What are the drawbacks of the Peer-to-Peer (P2P) Model?

A
  1. Decentralized Management: Inconsistent permissions and updates.
  2. Poor Scalability: Becomes inefficient with many devices.
  3. Dependence on Devices: Shared resources unavailable if a device is turned off.
37
Q

How do the Client-Server and Peer-to-Peer Models compare?

A
  • Cost: Client-Server is high; P2P is low.
  • Management: Client-Server is centralized; P2P is decentralized.
  • Scalability: Client-Server is highly scalable; P2P is inefficient for large networks.
  • Reliability: Client-Server has 24/7 dedicated servers; P2P depends on individual devices.
  • Setup Complexity: Client-Server needs skilled personnel; P2P is simple to set up.
38
Q

Which model is preferred for business networks and why?

A

The Client-Server Model because it offers centralized management, scalability, and reliability.

39
Q

Which model is suitable for small or temporary networks?

A

The Peer-to-Peer Model due to its low cost, flexibility, and ease of setup.

40
Q

What is a key relationship between the two models?

A

The benefits of one model are typically the drawbacks of the other.

41
Q

How are networks categorized by geography?

A

Based on the area they cover, from smallest (PAN) to largest (WAN).

42
Q

What is a Personal Area Network (PAN)?

A
  • Size: ~10 feet (3 meters).
  • Examples: Bluetooth (e.g., phone connecting to car stereo), USB connections, older Firewire standards.
  • Use Case: Short-range connections for personal devices.
43
Q

What is a Local Area Network (LAN)?

A
  • Size: ~100 meters (300 feet) per segment (further with fiber optic).
  • Examples: Home networks, office networks.
  • Technologies: Ethernet (802.3) for wired, Wi-Fi (802.11) for wireless.
  • Use Case: Connecting devices within a single building or area.
44
Q

What is a Campus Area Network (CAN)?

A
  • Size: Covers multiple buildings within a few miles.
  • Examples: College campuses, business parks, military bases.
  • Use Case: Interconnecting multiple LANs across a campus or facility.
45
Q

What is a Metropolitan Area Network (MAN)?

A
  • Size: Covers a city or metropolitan area (~25 miles or more).
  • Examples: University networks across a city, municipal services (e.g., police departments).
  • Use Case: Connecting multiple CANs across a city.
46
Q

What is a Wide Area Network (WAN)?

A
  • Size: Covers large geographic areas (state, country, or global).
  • Examples: The Internet (largest WAN), private intranets, government networks.
  • Technologies: Leased lines, VPNs, satellite communications.
  • Use Case: Connecting networks over vast distances.
47
Q

What are the size ranges of each network type?

A
  • PAN: ~10 feet (3 meters).
  • LAN: ~100 meters (300 feet) per segment.
  • CAN: Few miles.
  • MAN: Up to ~25 miles.
  • WAN: State, country, or global.
48
Q

What are the key technologies for LANs?

A
  • 802.3 (Ethernet): Wired networks.
  • 802.11 (Wi-Fi): Wireless networks.
49
Q

What is the order of network types by size?

A

PAN < LAN < CAN < MAN < WAN.

50
Q

Why is it important to know examples of each network type?

A

Familiarity with use cases helps differentiate network types on the exam.

51
Q

What is a network topology?

A

The arrangement of network elements like nodes, links, clients, and servers.

52
Q

What are the two types of network topologies?

A
  • Physical Topology: Shows physical connections (e.g., cabling).
  • Logical Topology: Focuses on how data flows within the network.
53
Q

What is a Point-to-Point Topology?

A
  • Description: Direct connection between two devices.
  • Examples: Computer to printer, WAN links between offices.
  • Pros: Simple and reliable.
  • Cons: Not scalable for large networks.
54
Q

What is a Ring Topology?

A
  • Description: Devices form a circular data path, each connecting to two others.
  • Data Flow: Unidirectional (clockwise or counterclockwise).
  • Pros: Prevents data collisions; redundancy with dual-ring setups.
  • Cons: Vulnerable to failure without redundant links.
  • Modern Use: Fiber Distributed Data Interface (FDDI) networks.
55
Q

What is a Bus Topology?

A
  • Description: Devices connect to a central cable (“bus”).
  • Data Flow: Broadcast to all devices; only the intended recipient processes it.
  • Pros: Easy to install, minimal cabling.
  • Cons: Single point of failure; performance degrades with more devices.
  • Legacy Use: Older office networks.
56
Q

What is a Star Topology?

A
  • Description: Devices connect to a central switch.
  • Data Flow: Managed by the switch.
  • Pros:
    * Robust: Failure of one link doesn’t affect others.
    * Centralized management.
  • Cons: Entire network fails if the central switch goes down.
  • Modern Use: Common in home and office networks
57
Q

What is a Hub-and-Spoke Topology?

A
  • Description: Variation of star topology where hubs act as central nodes for multiple spokes.
  • Pros:
    Cost-effective for regional connections.
    Reduces the need for direct connections.
  • Cons: Relies on hubs, which are potential points of failure.
  • Examples: Airline routing systems, corporate office networks.
58
Q

What is a Mesh Topology?

A
  • Description: Every device connects directly to others for redundancy.
  • Types:
    Full-Mesh: All nodes connect to each other.
    Partial-Mesh: Critical nodes are fully connected; others selectively connect.
  • Pros: High redundancy and reliability.
  • Cons: High cost and complexity.
  • Use Case: Critical systems or scaled-down partial-mesh setups.
59
Q

What is the difference between logical and physical topology?

A
  • Logical Topology: Focuses on how data flows.
  • Physical Topology: Focuses on physical layout and cabling.
60
Q

What are common practical uses for topologies?

A
  • Star: Most common in modern setups.
  • Mesh: For redundancy in critical systems.
  • Hub-and-Spoke: Efficient for inter-office connections.
61
Q

What trade-offs should you consider with topologies?

A
  • Simplicity vs. scalability.
  • Cost vs. redundancy.
62
Q

Why is understanding topologies important?

A

To design efficient and resilient network infrastructures.

63
Q

What are the three types of wireless network topologies?

A

The types of wireless network topologies are Infrastructure Mode, Ad Hoc Mode, and Wireless Mesh Topology.

64
Q

What is Infrastructure Mode in wireless networks?

A

Infrastructure Mode is a centrally managed wireless network that uses a Wireless Access Point (WAP). It operates similarly to a star topology, with centralized management and wireless security controls. A common example is a home Wi-Fi network connected to the internet through a cable or fiber modem. This mode is reliable, secure, structured, and scalable.

65
Q

What is Ad Hoc Mode in wireless networks?

A

Ad Hoc Mode is a decentralized, peer-to-peer wireless network where devices connect directly without the need for routers or access points. It is dynamic and typically used for temporary setups, such as laptop-to-laptop file sharing or gaming sessions. While it is quick to set up and flexible, it lacks security controls and scalability.

66
Q

What is Wireless Mesh Topology?

A

Wireless Mesh Topology is a dynamic network of interconnected nodes that utilize various wireless technologies such as Wi-Fi, Bluetooth, microwave, cellular, and satellite. It provides redundancy and reliability across large areas. Nodes communicate directly to share and route data. A common use case is disaster recovery, where multiple technologies work together to ensure reliable communication. This topology is highly reliable and scalable but involves complex setups and may require specialized equipment.

67
Q

How do the ranges of wireless topologies compare?

A

Infrastructure Mode typically supports ranges of 100 to 200 feet with Wi-Fi. Ad Hoc Mode is limited to peer-to-peer device ranges. Mesh Topology can scale from tens to thousands of miles, depending on the technologies used.

68
Q

What are the common use cases for each wireless topology?

A

Infrastructure Mode is most commonly used for home and business Wi-Fi networks. Ad Hoc Mode is ideal for temporary connections like file sharing or gaming. Mesh Topology is best suited for disaster recovery or large-scale, redundant network setups.

69
Q

Why is Infrastructure Mode the most common wireless setup?

A

It is the most common setup because it offers a structured, centralized, and secure system that works well for both homes and businesses.

70
Q

What makes Mesh Topology ideal for disaster recovery?

A

Its combination of multiple technologies provides redundancy, reliability, and scalability across large areas, making it highly effective in challenging environments.

71
Q

What is the key trade-off in Ad Hoc Mode?

A

Ad Hoc Mode is quick and flexible to set up, but it sacrifices security and scalability, making it unsuitable for larger or long-term networks.

72
Q

What is a datacenter?

A

A facility composed of network computers and storage systems designed for organizing, processing, storing, and distributing large amounts of data.

73
Q

What are examples of datacenter sizes?

A

Small datacenters (~150 sq. ft.): Single rack of networking and a few server racks.
Large datacenters (e.g., Utah Datacenter): 1.5 million sq. ft., costing $1.5 billion to build and $40M annually for electricity.

74
Q

What is the Three-Tiered Hierarchy in datacenter topology?

A

A layered architecture for large, complex networks:

  • Core Layer: High-performance routers; backbone of the network.
  • Distribution Layer: Layer 3 switches for subnet and VLAN routing, access control, and filtering.
  • Access Layer: Regular switches connecting endpoint devices like servers and printers.
    This model offers better performance, management, scalability, redundancy, and easier troubleshooting.
75
Q

What is the Collapsed Core model in datacenter topology?

A

A two-tier system merging the core and distribution layers.

  • Advantages: Simplified architecture, reduced costs, and lower latency.
  • Disadvantages: Limited scalability, unsuitable for large or complex networks.
  • Use Case: Ideal for small to medium-sized datacenters.
76
Q

What is the Spine and Leaf architecture?

A

A modern design for high-performance datacenters focusing on server-to-server communication.

  • Leaf Layer: Access switches aggregating server traffic.
  • Spine Layer: High-performance switches connecting all leaf switches in a full-mesh topology.
  • Advantages: High performance, low latency, scalable.
  • Use Case: Optimized for environments with software-defined networking (SDN) and high-density server farms.
77
Q

What are the two types of traffic flows in datacenters?

A
  • North-South Traffic: Data entering or exiting the datacenter, passing through boundary firewalls or routers.
  • East-West Traffic: Data moving within the datacenter, such as server-to-server communication, commonly seen with virtualization and private clouds.
78
Q

How do the three datacenter topologies compare?

A
  • Three-Tiered: Scalable and robust, best for large enterprise networks but costly and complex.
  • Collapsed Core: Simplified and cost-effective but limited in scalability, suitable for small to medium-sized datacenters.
  • Spine and Leaf: High performance and scalability but complex and costly, ideal for modern SDN environments.
79
Q

What are the key layers in the Three-Tiered Model?

A
  • Core: Backbone for network traffic.
  • Distribution: Routing, policies, and boundary definition.
  • Access: Connections for endpoint devices like servers and printers.
80
Q

Why is Spine and Leaf architecture well-suited for modern datacenters?

A

It is optimized for server-to-server communication, offering high performance, low latency, and scalability, essential in SDN and cloud environments.

81
Q

What is the difference between North-South and East-West traffic in datacenters?

A

North-South traffic flows in and out of the datacenter, while East-West traffic moves within the datacenter, often between servers.